Technology Insider: April Edition
Smartphones have taken over from laptops as most people’s preferred portable work tool. But that creates a new set of security risks to be aware of. In this month’s Technology Insider newsletter we share the latest advice.
Technology Insider: March Edition
Are you tired of feeling like technology is working against you? Fear not! This month’s Technology Insider newsletter is all about how we can make technology our best friend, not our worst enemy.
Technology Insider: February Edition
Have you ever felt like you’ve wasted money on technology that you thought would change your world? In our February edition of the Technology Insider we offer our best advice for making the right tech choices in your business.
Technology Insider: January Edition
This year kicks off with a look at some useful IT hacks to help cut your energy usage (when load shedding isn’t wreaking havoc).
Windows is the prime target for cyber criminals
With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals. They’re looking to access your information, disrupt your business, or hold your data to ransom.
Don’t fall for the latest “Cloud9” malware threat
If you use Google Chrome or Microsoft Edge in your business, beware of this new security threat. It can lead to the theft of data and your login details. Here’s what you need to know.
Can pirated software save you money?
It’s common for cyber criminals to use pirated software to distribute malware. Some of this is designed to evade firewalls, which means once installed, it can spread malicious files beyond your device to your entire network. That can lead to your sensitive data being compromised or stolen.
Are you using Teams to share sensitive data?
Even a trusted app like Teams is only as safe as the people who use it and the devices it’s installed on. If you are using Teams on personal devices and sharing sensitive data, this could be a major security risk. Here’s how to protect your business.
Could your Zoom download actually be malware?
There are many convincing-looking sites that are designed to tempt you into downloading fake Zoom software, which cyber criminals are using to steal sensitive data. Here’s how to avoid being tricked.
Your guide to Password Managers: PDF & Video
It’s likely that someone in your business is relying on a weak or reused password to protect their access to a critical system, which leaves your business at risk. Let’s look at how password managers can help you.